Jump to content

psexec on windows share with no password


p0w
 Share

Recommended Posts

Hi all,

I have a problem with the psexec exploit. I scanned a target with nessus. Nessus found an unrestrictetd smb share. It even listed the content of the share.

I tried to exploit the system with metasploits exploit/windows/smb/psexec without login credentials and the reverse meterpreter payload. The exploit failed.

At first i thought windows may not accept connections from an unknown host without PW. But how could nessus read the content of the share?

Any ideas?

Greetings,

P0w

Link to comment
Share on other sites

You need two things to be able to use psexec, the first is a share which you can upload your file to, the second is an account which you can ask to run the file. At the moment all you've done is upload a file to the machine which is just sitting there not doing anything.

You'll need some kind of credentials to actually run the file once uploaded.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...